I saw an interesting post on the Oracle-l list yesterday by Jared entitled "Alert 68 vulnerabilities explained". This post simply told us that NGS have released details of the bugs they found as part of the alert 68 patch fix. They said they would release details of each bug found in their original advisory. The date given then was 31st November 2004, which of course doesn't exist and also passed some time back. The advisory also said that they would give Oracle customers 3 months before releasing details of the bugs. Jared's post gave a URL that doesn't work, someone has replied to this in the same thread and said as much. Jared has replied to say he found out about the bugs / advisories by email and he concurred that the URL's do not work.
NGS, released 10 advisories to the bugtraq mailing list on 23 December 2004. These advisories give details of how to exploit the bugs found. Some give enough details for the reader to easily create exploits, some whilst giving details would be harder for a reader to create an exploit for. As the NGS links in the advisories do not work, I will list the links to the advisories on bugtraq here:
- Oracle wrapped procedure overflow (#NISR2122004J)
- Oracle multiple PL/SQL injection vulnerabilities (#NISR2122004H)
- Oracle TNS Listener DoS (#NISR2122004F)
- Oracle ISQLPlus file access vulnerability (#NISR2122004E)
- Oracle clear text passwords (#NISR2122004D)
- Oracle extproc local command execution (#NISR23122004C)
- Oracle extproc directory traversal (#NISR23122004B)
- Oracle extproc buffer overflow (#NISR23122004A)
- Oracle Character Conversion Bugs (#NISR2122004G)
- Oracle Trigger Abuse (#NISR2122004I)
It is obviously now very clear that anyone who has not applied the patches for alert #68 should do so without delay. Exploits for the details released will be written and circulated.
Apply the patch for alert 68.